Unformatted text preview: ants gather in a meeting room and are given
papers and pens.
◦ After the facilitator’s introduction, participants write
down the most significant risk they see on this project.
◦ Papers are handed forward.
◦ Facilitator organizes and lists the risks on a white board
or a flip chart.
Dr. Maged Ezzat Georgy Nominal Group Technique
Technique implemented as follows (continued):
◦ A second round follows and the additional risks are
added to the list.
◦ The process is repeated until no more risks are
identified. Dr. Maged Ezzat Georgy Nominal
Nominal Group Technique
Technique prevents any attendant from dominating
the session, as ideas are written rather than spoken.
The only restriction for the nominal group technique
is that the participants has to be geographically
located together. Dr. Maged Ezzat Georgy Delphi Technique
The technique does not require a meeting.
Thus it is useful in case of busy and geographically
The Delphi technique uses questionnaires aimed at
participants anonymous to each other. Dr. Maged Ezzat Georgy Delphi
◦ Prepares a questionnaire (that allows flexibility of
◦ Distributes it using email system or company intranet.
◦ Collects responses,
◦ Statistically analyzes the responses and consolidates the
risk list. Dr. Maged Ezzat Georgy Delphi Technique
◦ Sends the consolidated list with analysis results (also,
original response) back to each participant.
◦ New ideas are generated.
◦ The process is repeated several times until a consensus
is reached among the participants and no more risks
could be identified. Dr. Maged Ezzat Georgy Delphi
◦ The main drawback of the Delphi technique is that it is
lengthy and might take weeks to complete. Main advantage:
◦ Considered by many as the most sophisticated method
for risk identification (accurate, no dominance from any
participant, etc). Dr. Maged Ezzat Georgy...
View Full Document
This document was uploaded on 01/22/2014.
- Winter '14